ALT-BU-2015-2676-3
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2026-04-23
CVE-2009-1789
mod/server.mod/servmsg.c in Eggheads Eggdrop and Windrop 1.6.19 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PRIVMSG that causes an empty string to trigger a negative string length copy. NOTE: this issue exists because of an incorrect fix for CVE-2007-2807.
- http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0129.html
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=528778
- http://cvs.eggheads.org/viewvc/viewvc.cgi/eggdrop1.6/doc/Changes1.6?revision=1.20&view=markup
- http://osvdb.org/54460
- http://secunia.com/advisories/35104
- http://secunia.com/advisories/35158
- http://secunia.com/advisories/35690
- http://www.debian.org/security/2009/dsa-1826
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:126
- http://www.securityfocus.com/archive/1/503574
- http://www.securityfocus.com/bid/34985
- http://www.vupen.com/english/advisories/2009/1340
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50547
- https://www.exploit-db.com/exploits/8695
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01333.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01337.html
- http://archives.neohapsis.com/archives/fulldisclosure/2009-05/0129.html
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=528778
- http://cvs.eggheads.org/viewvc/viewvc.cgi/eggdrop1.6/doc/Changes1.6?revision=1.20&view=markup
- http://osvdb.org/54460
- http://secunia.com/advisories/35104
- http://secunia.com/advisories/35158
- http://secunia.com/advisories/35690
- http://www.debian.org/security/2009/dsa-1826
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:126
- http://www.securityfocus.com/archive/1/503574
- http://www.securityfocus.com/bid/34985
- http://www.vupen.com/english/advisories/2009/1340
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50547
- https://www.exploit-db.com/exploits/8695
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01333.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01337.html
Package postgresql9.4 updated to version 9.4.5-alt1 for branch sisyphus in task 150905.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-11958
Уязвимости системы управления базами данных PostgreSQL, позволяющие нарушителю вызвать отказ в обслуживании
Modified: 2021-03-23
BDU:2015-11959
Уязвимость системы управления базами данных PostgreSQL, позволяющая нарушителю вызвать отказ в обслуживании или прочитать произвольные участки памяти сервера
Modified: 2025-04-12
CVE-2015-5288
The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a "too-short" salt.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html
- http://www.debian.org/security/2015/dsa-3374
- http://www.debian.org/security/2016/dsa-3475
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.postgresql.org/about/news/1615/
- http://www.postgresql.org/docs/9.0/static/release-9-0-23.html
- http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
- http://www.postgresql.org/docs/9.2/static/release-9-2-14.html
- http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
- http://www.securityfocus.com/bid/77049
- http://www.securitytracker.com/id/1033775
- http://www.ubuntu.com/usn/USN-2772-1
- https://security.gentoo.org/glsa/201701-33
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html
- http://www.debian.org/security/2015/dsa-3374
- http://www.debian.org/security/2016/dsa-3475
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.postgresql.org/about/news/1615/
- http://www.postgresql.org/docs/9.0/static/release-9-0-23.html
- http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
- http://www.postgresql.org/docs/9.2/static/release-9-2-14.html
- http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
- http://www.securityfocus.com/bid/77049
- http://www.securitytracker.com/id/1033775
- http://www.ubuntu.com/usn/USN-2772-1
- https://security.gentoo.org/glsa/201701-33
Modified: 2025-04-12
CVE-2015-5289
Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values.
- http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commit%3Bh=08fa47c4850cea32c3116665975bca219fbf2fe6
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
- http://www.debian.org/security/2015/dsa-3374
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.postgresql.org/about/news/1615/
- http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
- http://www.securityfocus.com/bid/77048
- http://www.securitytracker.com/id/1033775
- http://www.ubuntu.com/usn/USN-2772-1
- https://security.gentoo.org/glsa/201701-33
- http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commit%3Bh=08fa47c4850cea32c3116665975bca219fbf2fe6
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
- http://www.debian.org/security/2015/dsa-3374
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.postgresql.org/about/news/1615/
- http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
- http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
- http://www.securityfocus.com/bid/77048
- http://www.securitytracker.com/id/1033775
- http://www.ubuntu.com/usn/USN-2772-1
- https://security.gentoo.org/glsa/201701-33
Closed bugs
please, add /usr/include/postgresql -> pgsql symlink
